Sciweavers

1138 search results - page 59 / 228
» Talking about concerns
Sort
View
CC
2004
Springer
127views System Software» more  CC 2004»
15 years 5 months ago
Analyzing Memory Accesses in x86 Executables
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate representations that are similar to those that can be c...
Gogul Balakrishnan, Thomas W. Reps
SDMW
2004
Springer
15 years 5 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
FPGA
2001
ACM
137views FPGA» more  FPGA 2001»
15 years 4 months ago
A crosstalk-aware timing-driven router for FPGAs
As integrated circuits are migrated to more advanced technologies, it has become clear that crosstalk is an important physical phenomenon that must be taken into account. Crosstal...
Steven J. E. Wilton
GROUP
1997
ACM
15 years 4 months ago
NYNEX portholes: initial user reactions and redesign implications
The prevalence of audio and video options on computers, coupled with the promise of bandwidth, have many prognosticators predicting a revolution in human communications. But what ...
Alison Lee, Andreas Girgensohn, Kevin Schlueter
CSFW
2010
IEEE
15 years 3 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...